Heratiki

joined 1 year ago
[–] [email protected] 2 points 6 months ago

Oof Sourceforge AND flatpaks? I’ll have to check this out but I’ll make sure I read it over well before anything.

[–] [email protected] 10 points 6 months ago* (last edited 6 months ago) (1 children)

Isn’t this the RockPi? Or is the RockPi just based on the RK3588? It’s great for open-source but good lord are these SBC’s astronomically high.

[–] [email protected] 2 points 6 months ago

IRIX was Unix based with BSD extensions and I believe Maxx Interactive now runs on FreeBSD without Linux compatibility mode. So hopefully it won’t be long before it goes open source. Though I can’t understand why it would be needed outside of anything but nostalgia.

[–] [email protected] 9 points 6 months ago* (last edited 6 months ago)

Android? It’s not wholly closed source similar to RedHat they’ve got closed source elements while using open source elements.

Linux and its kernel are based on GPL and so to distribute something using it would require a compatible license. That means a full distro can’t be anything but open source and actually be distributed in free or paid versions. That doesn’t mean there aren’t closed source interfaces being used personally or undistributed.

[–] [email protected] 10 points 6 months ago

We had to walk a delicate line with our kids (2005-2017) when it came to interaction online. Never wanted them to feel like we were keeping them from experiencing the knowledge or social interaction the internet provided. But we also kept close tabs and paid special attention to specific behaviors. So if they were in their netbooks we’d make it a habit to walk behind them not to look but just to see what their reaction would be. Kids mostly know right from wrong and when they feel it “might” be wrong they try and hide it from their parents. If you pay attention you’ll see them “hiding” and that’s a sign to dig deeper. This way they maintain their privacy and any issues can be brought to light with them directly.

(Understand that the following will have specific details changed just for anonymity’s sake) Grooveshark was the first interaction we saw was troublesome. So we sat our daughter down and asked her direct why she was trying to hide her netbook from us seeing it and what had she been doing she felt she needed to hide? The alternative was to relinquish the netbook until she told us. Come to find out a friend of hers from school (female 2 years older) was trying to slowly convince her to lie to her parents and sneak off with her. Our daughter told us this because it scared her not because she would lose her access. We also stayed open and active with our kids indulging in the same things they were interested in (Minecraft, Guitar Hero, etc) regardless if it was explicitly something we enjoyed. So she didn’t lose access to Grooveshark because she really loved listening to music. We just kept an eye on it and she removed her friend from communication. We explained what she was likely attempting and her friend admitted to it. They’re not friends now but it never happened again.

Don’t get me wrong, we made tons of bad calls before we learned what worked. But the key to all of it is paying attention. Not hovering over them and stopping them from making mistakes. But watching the nuance of their interactions with everyone around them. If they start to get secretive then there is usually a reason. And it’s best to just talk to them about it. And if one conversation doesn’t do it then have multiple conversations. Listen to what they have to say and why they were being secretive. Works best when they’re not expecting it too (like in the middle of playing Minecraft together). Anyway that’s just IMHO.

[–] [email protected] 3 points 7 months ago

I love Tabby simply because it allows me to set it up like the drop down terminal in Quake. Specifically its capabilities make my use of it easier and far more capable than something like guake.

[–] [email protected] 2 points 7 months ago (2 children)

It’s more than likely they “borrowed” some other Chinese company’s cloned Windows drive and used it for their install rather than roll their own. Could be they were malicious but coming out and claiming it was an error so quickly doesn’t really push that narrative hard.

[–] [email protected] 12 points 7 months ago (7 children)

According to this Tom’s Hardware article (https://www.tomshardware.com/desktops/mini-pcs/mini-pc-maker-ships-systems-with-factory-installed-spyware-acemagic-says-issue-was-contained-to-the-first-shipment) it isn’t firmware based spyware but just existing on the machine drive.

They were also found on the restore partition so a full wipe and fresh install would eliminate the issue. AceMagic have also claimed that the issue was isolated to the first round of shipments.

[–] [email protected] 3 points 7 months ago

I mean depending on what board you’re using it’s unlikely it’s hardware level snooping that supersedes changing the firmware. Especially if you stick to those that run on open source firmware.

[–] [email protected] 1 points 7 months ago

I meant it more as an inexperienced Linux user having to fix something and inadvertently causing havoc more so than drive wiping.

[–] [email protected] 1 points 7 months ago (2 children)

The F Windows posts are great and can be very therapeutic. But guaranteed those users haven’t issued a command that accidentally wipes out their entire drive accidentally. Or they haven’t had their Window Manager just up and decide it doesn’t feel like working anymore because of an update.

I work with Linux a lot simply because of my 3D printers and I love it. But being on a community driven edge can be a nightmare sometimes when something updates and you’ve got to track down the problem. For me that’s half the fun since I usually get to help someone else out with the same issue.

view more: next ›